Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TS 33.222  Word version:  16.1.0

Top   Top   Up   Prev   None
0…   4…

 

4  Overview of the Security Architecture

5  Authentication schemesWord‑p. 11

6  Use of Authentication ProxyWord‑p. 19

A  Technical Solutions for Access to Application Servers via Authentication Proxy and HTTPSWord‑p. 24

B  Guidance on Certificate-based mutual authentication between UE and application serverWord‑p. 25

C  Considerations for GBA security using a web browser and Javascript |R12|Word‑p. 26

D (Normative)  Security measures for usage of GBA with a web browser |R12|Word‑p. 30

$  Change historyWord‑p. 38


Up   Top